SECURITY EDUCATION
Why MFA Stops Most Attacks
An MFA lesson framed as scenario, attack chain, observable evidence, operator response, and WitnessOps controls.
A stolen password without MFA gives instant access. A stolen password with MFA often gives nothing.
Scenario
An attacker gets a valid password from phishing, password reuse, or a public breach. They try it against email, cloud, or finance systems.
Attack Chain
Without MFA
Password stolen
↓
Attacker signs in
↓
Account compromised
With MFA
Password stolen
↓
Attacker tries to sign in
↓
MFA prompt or challenge appears
↓
User denies or does not possess the factor
↓
Access blocked
Observable Evidence
Look for:
- repeated sign-in attempts that fail on the MFA step
- MFA prompts the user did not initiate
- weak MFA methods such as SMS on sensitive accounts
- privileged accounts with no MFA at all
- successful logins from exposed accounts that should have been challenged
Operator Response
- Enable MFA first on email, cloud admin, and finance systems.
- Prefer phishing-resistant methods for privileged or high-value accounts.
- Treat unsolicited MFA prompts as evidence of attempted compromise.
- Reset the password and revoke sessions if a prompt was accidentally approved.
WitnessOps Controls
The governed path should include:
- Authorization Model for who may change authentication settings
- Policy Gates for approval on privileged account changes
- What Evidence Is Required? to capture the account, method, and observed risk
- Receipts to sign exposure checks and corrective actions
Which MFA to use
| Method | Strength | Notes |
|---|---|---|
| Hardware key | Strongest | Phishing-resistant. Best for privileged access. |
| Authenticator app | Strong | Good default for most users. |
| Push notification | Good | Watch for fatigue and accidental approval. |
| SMS code | Better than nothing | Weakest option. Use only if nothing better is available. |
Priority order:
- Email — your email is the master key to every other account
- Cloud services — Microsoft 365, Google Workspace, AWS
- Financial accounts — banking, payroll
- Social media — used for impersonation and resets
- Everything else